Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
078497c0886af156dd8301fc5d98c658_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
078497c0886af156dd8301fc5d98c658_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
078497c0886af156dd8301fc5d98c658_JaffaCakes118.html
-
Size
213KB
-
MD5
078497c0886af156dd8301fc5d98c658
-
SHA1
4d66b6acf3a26f65229628e0ccb348d0b3acd6dc
-
SHA256
9a2770d780b8b9e0ada61b89632c66b9f6daf0127edf6e6d506c446624da1ed2
-
SHA512
8f4bb174ad2e5f6d58cb9f8bb7bfbc7ca6c63a226e19ae0ee3f0b8d844c3a4f364e3fad42246dc8ddc682f7eb666b8e46e680f82551a6842beb7b18fb6a0ab9f
-
SSDEEP
3072:jrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJg:nz9VxLY7iAVLTBQJlg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000d3d07a622628ab5c9afc4d29a384cc37c934d4a7ecf7806b7bba8d2e4aa80fd000000000e80000000020000200000009505f47d068c00ef8f8993b817c2deba8c46e8708ee68cdc5d6b74c8179c47f120000000104471cbcc60e02fe52c684f3d63b69eb1a036f7a29269a1a4c86ef8e66c748c400000005e0c55bdc94f21b53cfa2d76e007d2f5cc3faf2e6e68cad797ab842df2d9bf5cb97bad06599958f7adb9761d316f0f8b7137802a58797d75156d9d12e5452849 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433980536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67B65651-803D-11EF-9109-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107a3f3c4a14db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30 PID 2420 wrote to memory of 2220 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\078497c0886af156dd8301fc5d98c658_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6bb7fb25ba4491c2c98776e00ee4e6
SHA1bcffcc9f62c8ca030039ab63aede3a5a5f704cf0
SHA25605dedd402088fd9279ff12e16250373f0d9cbf5c3524766c16959f406b38001a
SHA512583931080cfef842f37e2fb072bf4a61f45867ec3eb34cd440d2dbe11a0bf8c9eda8eabf92f713ae2ebe1b32b1cec6576e527e9abcdec04600c6a4246c5c1a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764f8d869bb164d5720b49ed7444b0dd
SHA1e026d0782685d4af7d1cbdbc18e983fd10a9ada4
SHA2560b49fbe10a1d27c77d92bc1b7be737393f5e530f63e73ff11483d63c9254f412
SHA512251fbee8f003435d3d175f6f6b3194efa2a259df131878c0b263065ede278db4e2d50aef1b100a462b1a6781ad59472d56a8a9e01b1d4008303e82ea3322d1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc337aa92121cabb4ef8a36a1ee4ee19
SHA16bf5868d185cca35101db128545988ade1913f99
SHA2566158cf2d093dd88e1f5d55695b5b980bba46fc31901e58225080f4478b14b040
SHA5127f5d263bf1cfe21aba12dbbfcccc60361ece12929167c29cf5e1a68330f1609b8c126fd9870aa220ce628c8f6045b79916686c9e95531e052704c49683106d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f7aef49503216edfca49a63919b4ae
SHA1326dbe48f0848736e5faad6f2b3ac178fef8dc0e
SHA256a779114c6eada8d5d4012844534660bd1e52660ba6725fa3b1ec8c2f4a45d4b6
SHA51267e89cfd98840ea6d21e350d650eb2ceecadaf8eff7021faa7490ec3a4b6d8107a9c7de0b26acc73a4b789357953893ad6cfec33d4a775f0adff566d03ac49fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda8cfb1ea728c3a7f9e967d18d38120
SHA162937fade6fdc2032313e4713f056b597c073e43
SHA256a2ed131db96a208b5ebee3d059e49e06c3273a4ebd3ab860e7c58c3c71db9d01
SHA512cb5aac30ddf4a246c3034c2be4335c9c082ada5c74c43f3a72bb238826b8a2f3560b4526efc16e4fed41a99b11d495a12668c4dbe375b833332c062e8d39d98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56010320c0bc2a7ece9eeecce899f0bd4
SHA16efda54dbde91dbe885815df330389ae74a16680
SHA2564eac9950334a6df09ead913d82e8038ca9b04afa43d57378e4dd5fe1fd59d287
SHA512c599ec0a5b76563f61bbc63aa1fc630c0aacb712be94b9b56dff9d2f154244870cc013e827ee57fe4c56ec6d953f00dc7565140e4e43d196d32d1cdc25e63403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcea73113f64e4a9b9585d814c77090
SHA1120054917681a248a8b5514878e0319f2f90d6bc
SHA2562367a8b45aec940bce1fa01aa74a0f004253fc6e9df70fabca99fec37109d5be
SHA512fb25e7b5084abfc56b362ecc0bc6fcc360175c71acbd823f223915bdf43ff61281003a2223de16a2bd9694a2b144016429ba01eed246cc9671266b381cb4ffbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7aef29100128806fda7a98816fa2aa
SHA1ba0d9e8226599b1083475f4b659cfb4e1bbe289d
SHA256f20a63a785b7c32833e0d3b89550f3a4cda8ee2b59e5de4d0bda7b9a892afc37
SHA5128005d0e853d48222811702c4902f7989e13b565d0e691c0bdd56d085fafd981d475a697d48c0dd5b9c7fd959b85c518ac7784fe33ab9dc443537f6b93d4651a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5e1aef2d2bba053b4999e76ddef4d3
SHA10e14ae00c646573ec393b6e2d3aaa0c7aade88cd
SHA2566c82f1c5c3208e81fa424ed2d4d81a6752790cbe321d57cae0a11476225fe9c3
SHA5124b45f9317dead0e968e167352f909885ce2c5c0fce0348e3c0059f101411d063adb4fbde420e660796f688a9f758980dd5a7a6cd351611310a09bd6e5ab6d090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529618411359918afb4597046a2326624
SHA1c7549ce41aef824fb31e371426166eb78ad84165
SHA25662e603736478c2eca26d2b4cbb698d1cd6eb60208f74ac665ae2632e33353fc4
SHA512f9fcb4b13450714b3b7b077187e51280880fbce4eaa5a2db063c4b055a72646d8b005aa0be36f5dd54986a8f4056a390e63fd503c8128aafe6699e61fde99b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b717c70168bb8f6b2767ed2701b0a6
SHA1abdf6226a4b614b3f9257c36c123da77646a08b9
SHA256b31b724746d878cb015967c50426ffc6cf71f9f3793cbf8a798fdd322105321c
SHA512a94924c097a0472550194aaec3dbdd6b7b5f6397cfd335142a3d8edc31220f4c2a6ea3bdb22579cc2a2b274284029e194e9cddf76bcb0af17b37010b07f1bcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cb526a6a4647abad886875b1ecef21
SHA12210fa492eaf5736607948cefaf9f078adce57d5
SHA256f1f2f6d33dc95bff3ccb0daa1d58effd049a0d55e0c663bc4754a3947eef5240
SHA512f0e8919b917cf2a88167b0f9956ca38c32afc0ba5c4028bfb5ddb11d13f5a18121a6f280b22547f66e832d4f7cba53677d53ebb401de5405dd10815c45bf7319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ce4ce2caed709ed3ae4f9892191d3b
SHA1c279439b3cd0e481833692080bbfef708850b5ac
SHA2567d262875d2205216ed11db23b30b4e35baaea7438b1883b400143c62368873e3
SHA512d7b8ffaef4378ff85b188bd1e2a9d06d99b9d2e77d15abce3ecfaba8ebe1f4cb0ffa0ec48c88bbc853ec4b0eaa0af95f63f9b4c0dbc7308e6607d46a9c9a5c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7009f297e0ca42cced24af67755ecb4
SHA1cdda248b7501029c7c741c465eec7fda27b70f93
SHA256c20b58c4ef3cb3c6300be1c695a7d93e9908e3b8eca902060350b376a2574e8d
SHA5120bc0c2e5dbc6b9128b63ca5bcf7170e0239aed4183390d451240b53538a7a32735a6d6530df69b840fce7d4d1cee488fdddc53b9fcea2e37575ff738165f80a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540586c90678af4a34b21affc030a16e6
SHA119357689f2e0174fb4bb012484f7d6c154ae53ea
SHA2565f07deb055af1653c435c320541fae4c7d5b276569dc6f0869280fa85ba80ade
SHA5121bbd04845928345ba74cb0c9b5d96e167a14dc9629a433428ee02ea85afa848de432b06fc3ea4187b4e7c4d5dad91031d5305439c2c9356b41aa86e5eb8de6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73a65c02f372a1eb08045816ced5b6f
SHA1d3e33c45bd74bf9652d683b731f0437130371074
SHA256fda4cca38d691fbe83949a5498b513c40f9f5ffebfc6d4a4916dafa0b744ec23
SHA512fe65f1c82933c702ef605d7971dbeb6139af7a2cd530a55f71c4f2ce9b2741884b85ab952e266692c28b97b9c9b6a6562728d96ecc12c6d018da4b222b68c859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563c4b6d324fa615a5f29f22576c25d1
SHA1c61ed5d10abf7644aa6caae77756fa82c65e41ec
SHA2565c1d2f3b57ab5312b4733bda5765a9338cb41bcb479f02f68315cc85ce698cbf
SHA51234958545738e035a0314b3bbc9a9e5ff33eac784ffdb1b37df52ef01443403db3f2651008dd9112fdbbd8032796feaa7a9e3e0072cc8190bad3faa3c06dd6940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a11f42d62fabaeb47f759283e2d1c0
SHA187aa7cc318a2c87367519c46cc169f5f926b738b
SHA2567f871d95fbd3879f69ed792385c92f48d25c7f4fa3b7eef9522cfa9ad96259cb
SHA512dba10bd7e0afa5938c9dea209a1f99a55bec1f071974c91040dfbe60de170f8fafb263574b1e68803c40bed9696636745c5bf95924576425ca444bc1902165bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83ef8514762c15aa96c8e306e4781b3
SHA1a3fb300d2ad06740e87c5ddea2268c0dae7bc77b
SHA256c05ce956c23c9b9270bc62c70c3957db9c05acc0695b9ba2ef8fa80447c1c37e
SHA51299d5249119afe3297adbbe8b26ff5358daebeff963792e3db0c58a72f7c349b8cc01ef3f9c883c394cbb9d66c7492e67a5294486de6eb4869a24b1c2481c6982
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b